Archive

Category Archives for "Networking"

On the ‘web: A new way to deal with DDoS

Most large scale providers manage Distributed Denial of Service (DDoS) attacks by spreading the attack over as many servers as possible, and simply “eating” the traffic. This traffic spreading routine is normally accomplished using Border Gateway Protocol (BGP) communities and selective advertisement of reachable destinations, combined with the use of anycast to regionalize and manage load sharing on inbound network paths. But what about the smaller operator, who may only have two or three entry points, and does not have a large number of servers, or a large aggregate edge bandwidth, to react to DDoS attacks?

I write for ECI about once a month; this month I explain DOTS over there. What to know what DOTS is? Then you need to click on the link above and read the story. ?

The post On the ‘web: A new way to deal with DDoS appeared first on rule 11 reader.

How to keep Linux from hanging up on you

When you run a command in the background on a Linux system and then log out, the process you were running will stop abruptly. If you elect to run the command with a no-hangup command, on the other hand, it will continue running and will store its output in a file.Here's how this works. The nohup command instructs your process to ignore the SIGHUP signal that would normally shut it down. That allows you to leave time-consuming processes to complete on their own without you having to remain logged in. By default, the output of the command you are running will be left in a file named nohup.out so that you can find your data the next time you log in.To read this article in full or to leave a comment, please click here

How to keep Linux from hanging up on you

When you run a command in the background on a Linux system and then log out, the process you were running will stop abruptly. If you elect to run the command with a no-hangup command, on the other hand, it will continue running and will store its output in a file.Here's how this works. The nohup command instructs your process to ignore the SIGHUP signal that would normally shut it down. That allows you to leave time-consuming processes to complete on their own without you having to remain logged in. By default, the output of the command you are running will be left in a file named nohup.out so that you can find your data the next time you log in.To read this article in full or to leave a comment, please click here

How Red Bull Racing uses IoT to win

“Fast” seems like a simple concept, on the surface. Go fast enough and you can win races, even highly competitive ones like Formula 1 auto racing. But it takes a complex, sophisticated IT setup to get to the necessary level of fast, according to the CIO of Red Bull Racing, Matt Cadieux.In particular, the extensive IoT deployment that the team uses to squeeze the maximum  performance out of its cars is key to success, Cadieux saidThe carNaturally enough, it all starts with the car. F1 cars are essentially very light-weight, low-flying aircraft, mating an engine capable of around 600 horsepower with a fiberglass body and spindly chassis weighing in at about 1,500 pounds. They can get from zero to 100mph in an incendiary four seconds, corner like waterbugs, and keep drivers relatively safe even from collisions at the blistering speeds that F1 races can reach.To read this article in full or to leave a comment, please click here

Scaling Cloud Networking Up and Out

The broad adoption of Arista’s 100G spines and the enthusiastic acceptance of Arista’s R series exemplifies the demands of cloud networking. Leveraging the programmable, state-based EOS software foundation and 12 different merchant silicon chipsets, Arista has transformed the datacenter market over the past decade. Today we are introducing the next frontier in router migration for the decade ahead. Arista has been in the forefront of industry firsts with state driven programmable EOS and CloudVision, based on network wide cloud-class control and management.

198 million American voter records found unprotected on the internet

You’d think if someone had amassed personal information on nearly every registered US voter, and stored that information on an Amazon S3 storage bucket, that it would at least be protected with a password. But thanks to a misconfigured server, personal data of 198 million Americans voters could be downloaded by anyone who happened across it. It is believed to be the largest leak of voter records to have ever occurred anywhere in the world.That giant oops caused by Deep Root Analytics, a data analytics firm contracted to compile the information for the Republican National Committee, contained names, birthdates, home and mailing addresses, phone numbers, party affiliations, suspected ethnicities and religions, as well as analytics on who people would likely vote for and their stance on hot-button issues such as gun control and abortion.To read this article in full or to leave a comment, please click here

198 million American voter records found unprotected on the internet

You’d think if someone had amassed personal information on nearly every registered US voter, and stored that information on an Amazon S3 storage bucket, that it would at least be protected with a password. But thanks to a misconfigured server, personal data of 198 million Americans voters could be downloaded by anyone who happened across it. It is believed to be the largest leak of voter records to have ever occurred anywhere in the world.That giant oops caused by Deep Root Analytics, a data analytics firm contracted to compile the information for the Republican National Committee, contained names, birthdates, home and mailing addresses, phone numbers, party affiliations, suspected ethnicities and religions, as well as analytics on who people would likely vote for and their stance on hot-button issues such as gun control and abortion.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Internet of Things helps fuel growth of data lakes

Data lakes, storage repositories that hold extremely large amounts of raw data in its native format until the data is needed by users, are becoming increasingly popular within enterprises.Helping to fuel interest in data lakes are the digital transformation efforts underway at many enterprises, spurred by the emergence of the Internet of Things (IoT). The connected objects in the IoT will generate huge volumes of data.As more products, assets, vehicles and other “things” are instrumented and data ingested, it’s important that IoT data sets be aggregated in a single place, where they can be easily analyzed and correlated with other relevant data sets using big data processing capabilities. Doing so is critical to generating the most leverage and insight from IoT data.To read this article in full or to leave a comment, please click here

43% off OxyLED Mini Stick-on 6-LED Wireless Motion Sensing Night Light – Deal Alert

This tiny motion-sensing strip contains 6 bright LEDs, and sticks anywhere. Just the trick for illuminating an entryway door-lock, a kitchen cabinet, drawers, closet or the glove box in your car. Simply turns on when somebody is there, and turns off when no motion is sensed. And the part that sticks is actually a magnetic base, so you can pop the light off and take it with you as a torch if needed. Currently priced at 43% off, so right now you're paying just $16.99 for a two-pack. See this deal on Amazon.To read this article in full or to leave a comment, please click here

“The Internet is Home” – Youth voices on why we should keep the Internet on

Last year alone, the international digital rights advocacy organization Access Now recorded 56 Internet shutdowns worldwide. There's concern about this growing trend and worry that governments are blocking social media and communications tools, in particular.

Many private sector and civil society organizations have condemned the shutdowns, and there have been dialogues and campaigns held around the world to try and prevent this growing trend. But while most of these dialogues are filled with decision-makers, legislators, and civil society organizations, young voices have been left out.

Evelyn Namara

How to quicken your site’s webpage load time

If you run a website of any significant size, odds are you utilize some form of content management system (CMS). Wordpress, Drupal, or the like.And, if you don’t use such a system, you probably employ rather extensive use of some form of server-side, scripted, page generation. PHP, ASP, Ruby… the list goes on and on.There are many scenarios where such a system makes a great deal of sense. But I’m here to tell you, right now, that it is highly unlikely that you actually need them… at least for the majority of your page. And, what’s more, if you migrate away from a CMS system you can not only make your webpages smaller and faster-loading for your visitors… but you can save significantly on your server infrastructure costs as well.To read this article in full or to leave a comment, please click here